Enforcing Cybersecurity Constraints for LLM-driven Robot Agents for Online Transactions Authors: Shraddha Pradipbhai Shah, Aditya Vilas Deshpande | Published: 2025-03-17 Indirect Prompt InjectionCyber ThreatUser Authentication System 2025.03.17 2025.05.27 Literature Database
User authentication system based on human exhaled breath physics Authors: Mukesh Karunanethy, Rahul Tripathi, Mahesh V Panchagnula, Raghunathan Rengaswamy | Published: 2024-01-02 User Authentication SystemTime-Related FeaturesMachine Learning Method 2024.01.02 2025.05.27 Literature Database
“Do Users fall for Real Adversarial Phishing?” Investigating the Human response to Evasive Webpages Authors: Ajka Draganovic, Savino Dambra, Javier Aldana Iuit, Kevin Roundy, Giovanni Apruzzese | Published: 2023-11-28 Detection Rate of Phishing AttacksUser Authentication SystemExpert Opinion Collection Process 2023.11.28 2025.05.28 Literature Database
Continuous Authentication Using Mouse Clickstream Data Analysis Authors: Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy | Published: 2023-11-23 Model Performance EvaluationUser Authentication SystemWatermark Evaluation 2023.11.23 2025.05.28 Literature Database
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data Authors: Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso | Published: 2023-01-18 | Updated: 2024-03-13 Privacy Enhancing TechnologyUser Authentication SystemSelf-Attention Mechanism 2023.01.18 2025.05.28 Literature Database
Anomaly localization for copy detection patterns through print estimations Authors: Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2022-09-29 Data Protection MethodUser Authentication SystemPerformance Evaluation Metrics 2022.09.29 2025.05.28 Literature Database
Preprint: Privacy-preserving IoT Data Sharing Scheme Authors: Ali Abdullah S. AlQahtani, Hosam Alamleh, Reem Alrawili | Published: 2022-09-26 IoT Security RisksPrivacy Protection MethodUser Authentication System 2022.09.26 2025.05.28 Literature Database
You Can’t Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality Authors: Pier Paolo Tricomi, Federica Nenna, Luca Pajola, Mauro Conti, Luciano Gamberini | Published: 2022-09-22 Dataset GenerationPrivacy AssessmentUser Authentication System 2022.09.22 2025.05.28 Literature Database
Mouse Dynamics Behavioral Biometrics: A Survey Authors: Simon Khan, Charles Devlen, Michael Manno, Daqing Hou | Published: 2022-08-18 | Updated: 2024-05-01 User Activity AnalysisUser Authentication SystemUser Behavior Analysis 2022.08.18 2025.05.28 Literature Database
Privacy-preserving Similarity Calculation of Speaker Features Using Fully Homomorphic Encryption Authors: Yogachandran Rahulamathavan | Published: 2022-02-16 | Updated: 2022-03-14 Algorithm DesignUser Authentication SystemCryptographic Protocol 2022.02.16 2025.05.28 Literature Database